Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Photos: MessageLabs antivirus operations

1 of 6 NEXT PREV
  • pic8.jpg

    MessageLabs' headquarters are housed in three yellow-brick buildings near Gloucester. The buildings can only be entered by using a swipe card. Visitors must be announced 24 hours beforehand and have to be accompanied by a member of staff at all times.

    Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

    Caption by: Tom Espiner

  • pic1.jpg

    The Network Operations Centre (NOC) monitors MessageLabs' customer infrastructure, and is the first line of defence in combating malicious code and spam. This part of the company scans all mail destined for a client, before deciding whether the mail is spam, contains malware or is safe.

    Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

    Caption by: Tom Espiner

  • pic2.jpg

    The system in NOC used to monitor customers' email infrastructure and traffic is called 'Big Brother'. The monitor on the wall shows traffic and threats to customer servers, and threats within customers' emails.

    Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

    Caption by: Tom Espiner

  • pic4.jpg

    MessageLabs scans 150 million emails per day. The UK antivirus operations are run by eight full-time staff, who monitor current security alerts. Also on the team are five anti-spam specialists and support technicians. Workload is spread between them, and also between offices in Sydney, Hong Kong, Singapore, New York, Gloucester and London.

    Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

    Caption by: Tom Espiner

  • pic5.jpg

    The antivirus team has short-term fire-fighting projects that are dealt with on the spot. Every day MessageLabs stop 12,000 items that are not stopped by the antivirus engines alone.

    Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

    Caption by: Tom Espiner

  • pic10.jpg

    MessageLabs claims to be the first vendor to recognise the 'I Love You' virus — and the first to call it 'The Lovebug'. The directors of the company gave this picture of a 'Lovebug' to the antivirus and anti-spam teams, in recognition of their hard work.

    Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

    Caption by: Tom Espiner

1 of 6 NEXT PREV
  • pic8.jpg
  • pic1.jpg
  • pic2.jpg
  • pic4.jpg
  • pic5.jpg
  • pic10.jpg

MessageLabs runs its email monitoring operation from anonymous-looking labs in Gloucester. ZDNet UK goes behind their yellow-brick facade to where 'Big Brother' keeps an eye on things

Read More Read Less

MessageLabs' headquarters are housed in three yellow-brick buildings near Gloucester. The buildings can only be entered by using a swipe card. Visitors must be announced 24 hours beforehand and have to be accompanied by a member of staff at all times.

Published: November 30, 2005 -- 16:15 GMT (08:15 PST)

Caption by: Tom Espiner

1 of 6 NEXT PREV

Related Topics:

Security Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • How to protect your Google Account with the Advanced Protection Program

    If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, ...

  • Who is really in the driver’s seat? Unknown digital threats to your car’s security

    The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk. ...

  • Data leaks: The most common sources

    This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...

  • Facebook's worst privacy scandals and data disasters

    Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • How to avoid being phished during holiday shopping season

    Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...

  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums